Home page logo

pen-test logo Penetration Testing mailing list archives

Re: [PEN-TEST] MS00-048 and 'guest' SQL access?
From: "Curphey, Mark (ISS Atlanta)" <MCurphey () ISS NET>
Date: Wed, 20 Sep 2000 13:35:44 -0400


Log a call with tech support and they should be able to tell you. Sometimes
there is a reason and sometimes (unfortunately) there are false positives.

Did you try running it in pen test mode to see how it got in ?

-----Original Message-----
From: Loschiavo, Dave [mailto:DLoschiavo () FRCC CC CA US]
Sent: Tuesday, September 19, 2000 5:08 PM
Subject: MS00-048 and 'guest' SQL access?

A kind person on this list pointed (shoved) me in the direction to exploit a
system via SQL even though I did not have the 'sa' password. I used the
vulnerability covered in MS00-048. This attack required a valid connection
to one of the databases, but the creator of the software that was relying on
the MSDE was kind enough to publish the id and password of their dbo, so I
was able to use this attack.

I've been digging deeper and running ISS's database scanner against the host
(nice product by the way). It's telling me that 'guest' access is enabled on
the msdb database.

That got me to thinking that perhaps I could take advantage of this
vulnerablility even without the dbo id and password for their product's
database. However, I can find no way to connect directly to the msdb. Every
attempt to autheticate to the SQL service with a username of guest and a
null password fails.

Is it possible to connect directly to that database as guest with a null
password? If it is possible, how can I do this? If it isn't possible, why
does the ISS scanner bother reporting it as a problem?

Thanks to all!

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]